Zavio IP Camera

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v3 9.8
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Zavio
  • Equipment: IP Camera
  • Vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer, OS Command Injection

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow remote code execution.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Zavio IP Cameras are affected:

  • CF7500: version M2.1.6.05
  • CF7300: version M2.1.6.05
  • CF7201: version M2.1.6.05
  • CF7501: version M2.1.6.05
  • CB3211: version M2.1.6.05
  • CB3212: version M2.1.6.05
  • CB5220: version M2.1.6.05
  • CB6231: version M2.1.6.05
  • B8520: version M2.1.6.05
  • B8220: version M2.1.6.05
  • CD321: version M2.1.6.05

3.2 Vulnerability Overview

3.2.1 Stack-based Buffer Overflow CWE-121

Zavio IP Cameras CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220, CD321 with firmware version M2.1.6.05 are vulnerable to multiple instances of stack-based overflows. While processing XML elements from incoming network requests, the product does not sufficiently check or validate allocated buffer size. This may lead to remote code execution.

CVE-2023-3959 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

3.2.2 Stack-based Buffer Overflow CWE-121

Zavio IP Cameras CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220, CD321 with firmware version M2.1.6.05 are vulnerable to multiple insta

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: